Prosecution Insights
Last updated: April 19, 2026
Application No. 19/264,076

ACCOMODATION MANAGEMENT SYSTEM AND ACCOMODATION MANAGEMENT APPARATUS

Final Rejection §103
Filed
Jul 09, 2025
Examiner
ROBINSON, AKIBA KANELLE
Art Unit
3628
Tech Center
3600 — Transportation & Electronic Commerce
Assignee
NEC Corporation
OA Round
2 (Final)
39%
Grant Probability
At Risk
3-4
OA Rounds
5y 1m
To Grant
63%
With Interview

Examiner Intelligence

Grants only 39% of cases
39%
Career Allow Rate
221 granted / 566 resolved
-13.0% vs TC avg
Strong +24% interview lift
Without
With
+23.9%
Interview Lift
resolved cases with interview
Typical timeline
5y 1m
Avg Prosecution
42 currently pending
Career history
608
Total Applications
across all art units

Statute-Specific Performance

§101
29.5%
-10.5% vs TC avg
§103
58.1%
+18.1% vs TC avg
§102
6.3%
-33.7% vs TC avg
§112
3.6%
-36.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 566 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Status of Claims Due to communications filed 11/28/25, the following is a final office action. Claims 1, 5 and 9 are amended. Claims 1-12 are pending in this application and are rejected as follows. The previous rejection has been modified to reflect claim amendments. Claim Rejections - 35 USC § 103 In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis (i.e., changing from AIA to pre-AIA ) for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1-12 is/are rejected under 35 U.S.C. 103 as being unpatentable over SAKON (JP 2017182326 A), ad further in view of XU ET AL (CN 110443923 A), and further in view of RAFTIS (WO 2019006503 A). As per claim 1, SAKON discloses: at least one memory storing one or more instructions; and at least one processor configured to execute the one or more instructions, (SAKON: "a register DB (database) server 7 that is connectable to the mobile terminal via a network; memory capacity of the mobile terminal"); obtain a second face image of a user who uses the one or more services; and (SAKON (JP 2017182326 A): SOLUTION: "...and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person), ALSO SEE "perform a matching operation based on the face image of the first user obtained from the second camera and the checked-in user images in the second collection of images"); and register gender information of the user who has performed the check-in process as gender information of the permitted user, wherein the registering the first face image comprises performing an operating to store the first face image as the face image of the permitted user allowed to use the one or more services at the facility; permit use of the one or more services when a second face authentication is successful and when the gender information of the permitted user meets the use conditions of the services, (SAKON (JP 2017182326 A) discloses in: ABSTRACT: “The mobile terminal includes: a reception unit that receives the information about the qualification and the face information from the register DB server via the network; a storage unit that stores a face image of an authenticated person shot by using the camera function”; BACKGROUND-ART: "In the present invention, "qualification" can be defined as the right or authority obtained by the person, and "qualification" is to prove the qualification, for example, obtained by purchase, gift, assignment, etc. SOLUTION: An authentication system comprises: a portable mobile terminal 13 that has a camera and communication functions; and a register DB (database) server 7 that is connectable to the mobile terminal via a network. In the register DB server, information about a qualification to be authenticated, and face information on a legitimate proprietary of the qualification are registered. The mobile terminal includes: a reception unit that receives the information about the qualification and the face information from the register DB server via the network; a storage unit that stores a face image of an authenticated person shot by using the camera function; and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person; ALSO SEE THE FOLLOWING FOR THE AUTHENTICAITON/QUALIFICATION BEING FOR THE USE OF A SERVICE: "The facility user (qualified user) 1 applies for use at the facility 12 (T6). In such an environment, the place where the use facility 12 exists is defined as the qualification authentication place 8 of the present invention. More specifically in order for the user 1 to apply for the use of the facility, the point standing in front of the staff is the actual authentication place. At that point, the clerk shoots the face of the user 1 with the mobile terminal 13 and authenticates whether or not the user 1 in front of the user has a legitimate qualification to use the ticket. Note that this authentication is not authentication of whether or not the user who has the ticket is the person himself / herself, but whether or not the user who has applied for the ticket has a valid use qualification for the ticket provided at the ticket store 11; ALSO SEE THE FOLLOWING FOR THE DEVICE: "If the face image of the person to be authenticated photographed using the mobile terminal on the authentication side matches the face information sent from the server device, the qualification given to the person to be authenticated by the information on the qualification 3. The qualification authentication according to claim 2, further comprising an approval information input unit for inputting into the mobile terminal on the authenticating side the approval information indicating consent for exercising the qualification when the authenticated person exercises system."; ALSO SEE THE FOLLOWING FOR GENDER INFORMATION: "In addition, when an unspecified number of persons to be authenticated are targeted, depending on the nature of the qualification to be authenticated, qualification holders corresponding to this may be collectively received. In the case where a large number of users visit at the same time, in consideration of the memory capacity of the mobile terminal, each certifier (person in charge) is assigned to each terminal (for example, alphabet, age, gender, birth). The user may be authenticated in an empty space by guiding the user."); wherein the second face authentication is based on the first face image and the second face image, (SAKON (JP 2017182326 A): SOLUTION: and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person), ALSO SEE "perform a matching operation based on the face image of the first user obtained from the second camera and the checked- in user images in the second collection of images"); SAKON does not disclose the following limitations, however, XU et al discloses: obtain a first face image of a user using a check-in terminal at a facility, (XU ET AL: "the first information collecting point is set at least comprises human face image collecting module on the hotel foreground area"; ALSO See claim 1 of XU et al: "the first information collecting point is set at least comprises human face image collecting module on the hotel foreground area, face detecting identifying module of the foreground self-service terminal device, extracting face image information"; ALSO SEE XU et al, "In this step, the feature calculating similarity should be beneficial compared to data, algorithm is simple, that is to say the face judging authentication of whether the identified face to be belong to the same person, the identification threshold value is set toa low similarity... for calculating and obtaining the similarity of the human face feature vector and a certificate photograph system to the extracted human face feature vector, by to obtain the identification result and the threshold value. is greater than or equal to threshold similarity, then this indicates that the certificate is certificate, identity authentication is successful, or else, the identity authentication is failed); identify the user by a first face authentication using the first face image and a pre-stored image, and perform a check-in process of the user, (See claim 1 of XU et al: "at the hotel entrance, based on monitoring video intelligent terminal collects entering all the human face data hotel, wherein said video intelligent monitoring terminalis an active face detection, it at least includes a face detection module, a face image collecting module; human face image data of the video intelligent terminal transmits the collected is sent to the server for further processing and stored in the face database.. the first information collecting point is set at least comprises human face image collecting module on the hotel foreground area, face detecting identifying module of the foreground self-service terminal device extracting face image information field and comparing the human face image within a predetermined information face database stored in the reservation system by face detecting identifying module, according to the similarity judging whether it is the same human face, by matching, configured guest and granted by the system based on the access right of the face"; ALSO SEE Xu et al: "Specifically, after obtaining the human face image and extracting the characteristic value in the area, a face identification module transfers the stored characteristic value in the face database for similarity matching of low threshold value..."); register the first face image of a user who has performed the check-in process as a face image of a permitted user who is allowed to use one or more services of a predetermined equipment at the facility, (See claim 1 of XU et al: S4 room entrance guard area, to open the room access based on human face identification with high); send a control signal to trigger a lock to open a barrier: (XU et al: “wherein the intelligent entrance guard of the invention is divided into an elevator, stairs and other position of public entrance guard system and guest access system. public access system and guest access system should at least comprise processing server and an embedded device terminal, the embedded device terminal can be fixed beside the entrance guard, for information acquisition, access control switch, a processing server for photos uploaded to the terminal for matching, comparing, identifying, matching is successful, sending the door opening signal to the embedded device”); It would have been obvious to one of ordinary skill in the art at the time the invention was filed to include the above limitations as taught by XU ET AL in the systems of SAKON et al, since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable. SAKON does not disclose: output a message to the user to input reservation information of the user in response to a determination that the first face image of the user does not match the pre- stored image, wherein the at least one processor does not output the message in response to a determination that the first face image matches the pre-stored image; However, RAFTIS (WO 2019006503 A) discloses: “At this time, a camera 16 located at the point of entry captures a picture of the boarding passenger s face and this image is compared with the image taken of the passenger associated with the retrieved N FC tag details at check-in, and if a discrepancy is found an alert notification is triggered. At step 144, the passenger or crew confirm by touchscreen selection that the tag details are correct in respect of the passenger attempting to board” It would have been obvious to one of ordinary skill in the art at the time the invention was filed to include the above limitations as taught by RAFTIS in the systems of SAKON et al, since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable. As per claim 2, SAKON discloses: wherein the at least one processor is further configured to display to inform the permitted user that the services to use are incorrect in a case that it is determined that the user is making a mistake on the services to use, (SAKON, (In the case where the ticket (qualification) plays only the role as an admission ticket (pattern (C1) in FIG. 6), the authenticator only needs to determine the identity and whether or not there is admission. Therefore, the mobile terminal (13 in FIG. 1) in that case may have a function as shown in FIG. That is, the functions required for the mobile terminal 13 include the camera function 15 for photographing the face of the person to be authenticated, the authentication program execution unit 16, and the face information and qualification information of the qualification holder used for verification at the time of authentication. The information receiving unit 17 received from the registration DB server 7, the face image storage unit 18 storing the face image of the person to be authenticated photographed by the camera, the face image of the person to be authenticated and the qualification sent from the registration DB server 7 A collation unit 19 that determines whether the owner's face information matches/ disagrees, an authentication result output unit 21 that outputs an authentication result according to the collation result, and at least the data of the face image storage unit 18 and the received face information after the end of the authentication And an information erasing unit 22 for erasing). It would have been obvious to one of ordinary skill in the art at the time the invention was filed to include the above limitations as taught by SAKON et al in the systems of XU ET AL, since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable. As per claim 3, SAKON discloses: wherein the second face authentication is be performed only on the users who have checked in at the facility, (SAKON (JP 2017182326 A): perform a matching operation based on the face image of the first user obtained from the second camera and the checked-in user images in the second collection of images"); As per claim 4, SAKON discloses: wherein the at least one processor is further configured to: collate the second image with only the face images of the user who is to be permitted to use the service; and determine whether or not they are the same person, (SAKON (JP 2017182326 A): SOLUTION: and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person); As per claim 5, this claim recites limitations similar to those disclosed in independent claim 1 and is therefore rejected for similar reasons. As per claim 6, SAKON discloses: displaying to inform the permitted user that the services to use are incorrect in a case that it is determined that the user is making a mistake on the services to use, (SAKON discloses: (In the case where the ticket (qualification) plays only the role as an admission ticket (pattern (C1) in FIG. 6), the authenticator only needs to determine the identity and whether or not there is admission. Therefore, the mobile terminal (13 in FIG. 1) in that case may have a function as shown in FIG. That is, the functions required for the mobile terminal 13 include the camera function 15 for photographing the face of the person to be authenticated, the authentication program execution unit 16, and the face information and qualification information of the qualification holder used for verification at the time of authentication. The information receiving unit 17 received from the registration DB server 7, the face image storage unit 18 storing the face image of the person to be authenticated photographed by the camera, the face image of the person to be authenticated and the qualification sent from the registration DB server 7 A collation unit 19 that determines whether the owner's face information matches/disagrees, an authentication result output unit 21 that outputs an authentication result according to the collation result, and at least the data of the face image storage unit 18 and the received face information after the end of the authentication And an information erasing unit 22 for erasing). As per claim 7, SAKON discloses: wherein the second face authentication is be performed only on the users who have checked in at the facility, ("perform a matching operation based on the face image of the first user obtained from the second camera and the checked-in user images in the second collection of images"); As per claim 8, SAKON discloses: collating the second image with only the face images of the user who is to be permitted to use the service; and determining whether or not they are the same person, (SAKON (JP 2017182326 A): SOLUTION: "...and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person); As per claim 9, this claim recites limitations similar to those disclosed in independent claim 1 and is therefore rejected for similar reasons. As per claim 10, SAKON discloses: wherein the facility management method further comprising: displaying to inform the permitted user that the services to use are incorrect in a case that it is determined that the user is making a mistake on the services to use, (SAKON discloses: (In the case where the ticket (qualification) plays only the role as an admission ticket (pattern (C1) in FIG. 6), the authenticator only needs to determine the identity and whether or not there is admission. Therefore, the mobile terminal (13 in FIG. 1) in that case may have a function as shown in FIG. That is, the functions required for the mobile terminal 13 include the camera function 15 for photographing the face of the person to be authenticated, the authentication program execution unit 16, and the face information and qualification information of the qualification holder used for verification at the time of authentication. The information receiving unit 17 received from the registration DB server 7, the face image storage unit 18 storing the face image of the person to be authenticated photographed by the camera, the face image of the person to be authenticated and the qualification sent from the registration DB server 7 A collation unit 19 that determines whether the owner's face information matches/ disagrees, an authentication result output unit 21 that outputs an authentication result according to the collation result, and at least the data of the face image storage unit 18 and the received face information after the end of the authentication And an information erasing unit 22 for erasing). It would have been obvious to one of ordinary skill in the art at the time the invention was filed to include the above limitations as taught by SAKON et al in the systems of XU ET AL, since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable. As per claim 11, SAKON discloses: wherein the second face authentication is be performed only on the users who have checked in at the facility, (SAKON (JP 2017182326 A): perform a matching operation based on the face image of the first user obtained from the second camera and the checked-in user images in the second collection of images"); As per claim 12, SAKON discloses: wherein the facility management method further comprising: collating the second image with only the face images of the user who is to be permitted to use the service; and determining whether or not they are the same person, (SAKON (JP 2017182326 A): SOLUTION: "...and a collation unit that implements processing of collating the face information transmitted from the register DB server with the shot face image within the terminal. As a result of the collation processing in the collation unit, when the face information and the face image coincide with each other and the information about the qualification is judged valid, the authenticated person is authenticated to be the legitimate proprietary of the qualification, and a right to be granted by the qualification is given to the authenticated person); Prior Art Considered The following art is considered relevant by Examiner, however, has not been used in the present Office Action: -KAWASE (EP 3418912 A1) -森 ▲高▼幸 (JP 6163239 B1) Response to Arguments Applicant’s arguments, see arguments/amendments filed 11/28/25, with respect to the 35 USC 101 rejection have been fully considered and are persuasive. The 35 USC 101 rejection of claims 1-12 has been withdrawn. Applicant’s arguments, see arguments/amendments, filed 11/28/25, with respect to the rejection(s) of claim(s) 1-12 rejected under 35 U.S.C. 103 as being unpatentable over SAKON (JP 2017182326 A), and further in view of XU ET AL (CN 110443923 A), have been fully considered and are persuasive. Therefore, the rejection has been withdrawn. However, upon further consideration, a new ground(s) of rejection is made further in view of RAFTIS (WO 2019006503 A). Conclusion THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to Akiba Robinson whose telephone number is 571-272-6734 and email is Akiba.Robinsonboyce@USPTO.gov. The examiner can normally be reached on Monday-Thursday 6:30am-4:30pm. If attempts to reach the Examiner by telephone are unsuccessful, the Examiner's supervisor, Resha Desai can be reached on 571-270-7792. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system, Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (I N USA OR CANADA) or 571-272-1000. Any inquiry of a general nature or relating to the status of this application or proceeding should be directed to the receptionist whose telephone number is (703) 305-3900. December 28, 2025 /AKIBA K ROBINSON/Primary Examiner, Art Unit 3628
Read full office action

Prosecution Timeline

Jul 09, 2025
Application Filed
Aug 23, 2025
Non-Final Rejection — §103
Nov 24, 2025
Examiner Interview Summary
Nov 24, 2025
Applicant Interview (Telephonic)
Nov 28, 2025
Response Filed
Dec 31, 2025
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12602711
SYSTEM AND METHOD OF PROVIDING EXTERIOR WORK ESTIMATE
2y 5m to grant Granted Apr 14, 2026
Patent 12518241
SHIPPING CARTON OPTIMIZATION SYSTEM AND METHOD
2y 5m to grant Granted Jan 06, 2026
Patent 12511606
WEARABLE READER DEVICE TECHNOLOGY FOR GUIDING A USER TO LOAD AN ASSET IN AN ASSIGNED LOGISTICS VEHICLE
2y 5m to grant Granted Dec 30, 2025
Patent 12493917
A POWER DISTRIBUTION SYSTEM HAVING A NETWORK OF SMART METERS
2y 5m to grant Granted Dec 09, 2025
Patent 12482050
ONBOARD VEHICLE SHARING SERVICE
2y 5m to grant Granted Nov 25, 2025
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
39%
Grant Probability
63%
With Interview (+23.9%)
5y 1m
Median Time to Grant
Moderate
PTA Risk
Based on 566 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month